Is Moore's Party Over?
For almost 50 years we have been riding Moore's Law's exponential curve. Oh, what a ride it has been! No other technology has ever improved at a geometric rate for decades …
Moshe Y. Vardi
Page 5
DEPARTMENT:
Letters to the editor
Justice For Jahromi
The computer science community is deeply concerned over the fate of Masaud Jahromi, chairman of the Department of Computer Science and Engineering at Ahlia University in Bahrain …
CACM Staff
Pages 6-7
In the Virtual Extension
To ensure the timely publication of articles, Communications created the Virtual Extension to bring readers high-quality articles in an online-only format. The following article is now available in its entirety to ACM members …
CACM Staff
Page 9
DEPARTMENT:
[email protected]
In Support of Open Reviews; Better Teaching Through Large-Scale Data Mining
Bertrand Meyer writes about his long-standing decision not to provide anonymous reviews. Greg Linden considers how educational practices could be improved through the data mining of students' schoolwork.
Bertrand Meyer, Greg Linden
Pages 12-13
DEPARTMENT:
CACM online
ACM Offers a New Approach to Self-Archiving
A new service, named the ACM Author-Izer, is a unique tool that enables ACM authors to generate and post links on either their home page or institutional repository that will …
Scott E. Delman
Page 14
COLUMN:
News
Modeling Chaotic Storms
Scientists say improvements to extreme-weather prediction are possible with new weather models and a reinvention of the modeling technologies used to process them.
Kirk L. Kroeker
Pages 15-17
Hacking Cars
Researchers have discovered important security flaws in modern automobile systems. Will car thieves learn to pick locks with their laptops?
Alex Wright
Pages 18-19
Risky Business
Governments, companies, and individuals have suffered an unusual number of highly publicized data breaches this year. Is there a solution?
Leah Hoffmann
Pages 20-22
COLUMN:
Privacy and security
Security Risks in Next-Generation Emergency Services
Sounding the alert on emergency calling system deficiencies.
Hannes Tschofenig
Pages 23-25
COLUMN:
Economic and business dimensions
What Gets Measured Gets Done
"U.S. broadband is terrible" has become a familiar meme. Given the growing importance of broadband Internet connections, a poor broadband infrastructure would indeed be cause for concern. As it turns out, however, much of this …
Scott Wallsten
Pages 26-28
COLUMN:
Legally speaking
Why the Google Book Settlement Failed - and What Comes Next?
Assessing the implications of the Google Book Search settlement.
Pamela Samuelson
Pages 29-31
COLUMN:
Computing ethics
Will Software Engineering Ever Be Engineering?
Considering whether software engineering and engineering can share a profession.
Michael Davis
Pages 32-34
COLUMN:
Education
Teaching-Oriented Faculty at Research Universities
Nine teacher-oriented faculty in computer science departments at research universities in the U.S. or Canada describe how their positions work, how they contribute to education, and how departmental policies can influence their …
SIGCSE Teaching-Oriented Faculty Working Group
Pages 35-37
COLUMN:
Viewpoint
Gender Demographics Trends and Changes in U.S. CS Departments
Using the past 10 years of Taulbee Survey data to evaluate female student enrollment across varied academic institutions and departments.
Douglas Baumann, Susanne Hambrusch, Jennifer Neville
Pages 38-42
SECTION:
Practice
The Software Industry is the Problem
The time has come for software liability laws.
Poul-Henning Kamp
Pages 44-47
Java Security Architecture Revisited
Difficult technical problems and tough business challenges.
Li Gong
Pages 48-52
OCaml For the Masses
Why the next language you learn should be functional.
Yaron Minsky
Pages 53-58
SECTION:
Contributed articles
'Natural' Search User Interfaces
Users will speak rather than type, watch video rather than read, and use technology socially rather than alone.
Marti A. Hearst
Pages 60-67
Managing Is Adoption in Ambivalent Groups
Insightful implementers refocus user ambivalence and resistance toward trust and acceptance of new systems.
DongBack Seo, Albert Boonstra, Marjolein Offenbeek
Pages 68-73
The Rise and Fall of High Performance Fortran
HPF pioneered a high-level approach to parallel programming but failed to win over a broad user community.
Ken Kennedy, Charles Koelbel, Hans Zima
Pages 74-82
SECTION:
Review articles
Nanonetworks: A New Frontier in Communications
Technology able to create devices the size of a human cell calls for new protocols.
Ian F. Akyildiz, Josep Miquel Jornet, Massimiliano Pierobon
Pages 84-89
SECTION:
Research highlights
Technical Perspective: Making Untrusted Code Useful
The following paper combines two important themes in secure computing: assurance and information flow control. For high assurance, a system's Trusted Computing Base needs to be small and the policy simple. Flow control is one …
Butler Lampson
Page 92
Making Information Flow Explicit in HiStar
Features of the new HiStar operating system permit several novel applications, including privacy-preserving, untrusted virus scanners and a dynamic Web server with only a few thousand lines of trusted code.
Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières
Pages 93-101
Technical Perspective: A Perfect 'Match'
In a breakthrough contribution, the authors of the paper that follows have developed an efficient way to find approximate nearest neighbors for the case of database patches within image data.
William T. Freeman
Page 102
The Patchmatch Randomized Matching Algorithm For Image Manipulation
This paper presents a new randomized algorithm for quickly finding approximate nearest neighbor matches between image patches. Our algorithm offers substantial performance improvements over the previous state of the art.
Connelly Barnes, Dan B. Goldman, Eli Shechtman, Adam Finkelstein
Pages 103-110
COLUMN:
Last byte
Puzzled: Distances Between Points on the Plane
Welcome to three new puzzles. Solutions to the first two will be published next month; the third is as yet (famously) unsolved.
Peter Winkler
Page 120
SECTION:
Viewpoints: Virtual extension
Information Seeking: Convergence of Search, Recommendations, and Advertising
How to address user information needs amidst a preponderance of data.
Hector Garcia-Molina, Georgia Koutrika, Aditya Parameswaran
Pages 121-130